# Tracking JS Blocklist - Formats * [URL-based](#url-based) * [URL-based (Vivaldi)](#url-based-vivaldi) * [Plain URL](#plain-url) - [Compressed version](#compressed-version) - [See also](#see-also) - [FAQ and Guides](#faq-and-guides) - [CI Variables](#ci-variables) - [License](#license) A blocklist of javascript links (or webpages with javascript) that perform [browser fingerprinting](https://en.wikipedia.org/wiki/Web_tracking). The original data set is collected by DuckDuckGo's [Tracker Radar](https://github.com/duckduckgo/tracker-radar) project. Blocklist is updated on the first day of the month. The list contains **all** the links that Tracker Radar detected to have browser fingerprinting, there is no further processing to remove false positive. - uBlock Origin (uBO) -> [URL-based](#url-based) section - AdGuard browser extension -> [URL-based](#url-based) section - Vivaldi -> [URL-based (Vivaldi)](#url-based-vivaldi) section - [Plain URL](#plain-url) - original links without filter syntax Check out my other filters: - [urlhaus-filter](https://gitlab.com/malware-filter/urlhaus-filter) - [phishing-filter](https://gitlab.com/malware-filter/phishing-filter) - [pup-filter](https://gitlab.com/malware-filter/pup-filter) - [vn-badsite-filter](https://gitlab.com/malware-filter/vn-badsite-filter) ## URL-based Import the following URL into uBO/AdGuard to subscribe: - https://malware-filter.gitlab.io/malware-filter/tracking-filter.txt
Mirrors - https://curbengh.github.io/malware-filter/tracking-filter.txt - https://curbengh.github.io/tracking-filter/tracking-filter.txt - https://malware-filter.gitlab.io/tracking-filter/tracking-filter.txt - https://malware-filter.pages.dev/tracking-filter.txt - https://tracking-filter.pages.dev/tracking-filter.txt
## URL-based (Vivaldi) _Requires Vivaldi Desktop/Android 3.3+, blocking level must be at least "Block Trackers"_ Import the following URL into Vivaldi's **Tracker Blocking Sources** to subscribe: - https://malware-filter.gitlab.io/malware-filter/tracking-filter-vivaldi.txt
Mirrors - https://curbengh.github.io/malware-filter/tracking-filter-vivaldi.txt - https://curbengh.github.io/tracking-filter/tracking-filter-vivaldi.txt - https://malware-filter.gitlab.io/tracking-filter/tracking-filter-vivaldi.txt - https://malware-filter.pages.dev/tracking-filter-vivaldi.txt - https://tracking-filter.pages.dev/tracking-filter-vivaldi.txt
## Plain URL A list of URLs without any filter syntax. - https://malware-filter.gitlab.io/malware-filter/tracking-data.txt
Mirrors - https://curbengh.github.io/malware-filter/tracking-data.txt - https://curbengh.github.io/tracking-filter/tracking-data.txt - https://malware-filter.gitlab.io/tracking-filter/tracking-data.txt - https://malware-filter.pages.dev/tracking-data.txt - https://tracking-filter.pages.dev/tracking-data.txt
## Compressed version All filters are also available as gzip- and brotli-compressed. Gzip: https://malware-filter.gitlab.io/malware-filter/tracking-filter.txt.gz Brotli: https://malware-filter.gitlab.io/malware-filter/tracking-filter.txt.br ## See also - [DuckDuckGo Browser Extension](https://github.com/duckduckgo/duckduckgo-privacy-extension) supports more advanced features like script surrogate and CNAME uncloak. - [Blokada version](https://blokada.org/blocklists/ddgtrackerradar/standard/hosts.txt) can block more tracking domains but with more false positives. [More details](https://community.blokada.org/t/introducing-duckduckgo-tracker-radar-to-blokada/469) ## FAQ and Guides See [wiki](https://gitlab.com/malware-filter/malware-filter/-/wikis/home) ## CI Variables Optional variables: - `CLOUDFLARE_BUILD_HOOK`: Deploy to Cloudflare Pages. - `NETLIFY_SITE_ID`: Deploy to Netlify. ## License [src/](src/): [Creative Commons Zero v1.0 Universal](LICENSE-CC0.md) and [MIT License](LICENSE) filters: [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/) DuckDuckGo Tracker Radar data: [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/) This repository is not endorsed by DuckDuckGo.